SeeTwo (THM)
Can you see who is in command and control?
Last updated
Can you see who is in command and control?
Last updated
Hello Fellows today we have a kinda blue team machine looks interesting let's get right into it.
First we need to install the zip file to extract the pacp file and open it with wireshark to see what we have.
So the first thing interest me was a communication at stream 3 which has base 64 data. will take it one by one.
after decode the data using cyberchef we will see an image.
i have decoded all of them but i only found these two images am not sure what they mean but let's let this aside and look in another place.
So after a bit more search i found that there is an end point called /client_base64 which has been requested.
So we can export this to attempt to decoded. using wireshark we can do. file -> export object -> HTTP. and from there we just save the file.
after we save the file we decoded it and we find that it actually a binary file. let's use ghidra to reverse engineer it.
ghidra did not give me much so i decide to use another way using the strings command in linux we can see that this file looks like a python compiled which is a .pyc file.
reading a bit in hackTricks we can find a tool called pyinstxtractor which help us to extract the .pyc files from a compiled file. Note that we assume the file has been compiled using PyInstaller.
after that we can use a tool called. uncompyle6 to convert from pyc to py files.
this how we can install the tool.
now let's use it.
so decompile the client.pyc file we get this results.
we can see in the code that he attept to append some data to the images that we found and when it recive it it will do some XOR operations as an encryption and then append it again and send the image with the resulted command executed on the target system and this gose forever. using some python we can decode evey message and extract the command the the results.
as we can see in the code we can reverse the XOR operation by doing it again on the same encrypted data.
we can find the answer of the first question here.
the attacker was able to find some creds in the file from the first question.
continue decrypt the messages we can find the answer of the third question.
the machine actullay was so much fun it teach u about python compiled and how to extract the pyc files convert them into py file and how to decrypt some data. as for the question once you have the decryptor code you just copy and paste of the answer overall it was soooooooooooooooooooo fun.